Application Reports
The Application Reports are available only for Fortigate, Check Point, and SonicWALL Firewalls. This section includes reports that help in monitoring
the bandwidth consumed by the application accessed by user like Skype, Facebook, Youtube etc.
|
Note:
- Ensure that the Fortigate Firewall has Application Control service to generate Application logs, which is for creating Application reports.
- The Application report is available only in Standalone and Collector servers of Firewall Analyzer
|
Select the device using Select Device: <> drop down list to get the Application reports
Export as
The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:
Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).
Schedule Report
You can schedule the report to be generated at pre-configured periodic interval.
On demad Application report can be created.
The Application graph shows distribution
of application events like Skype, Facebook, Youtube, etc. generated for each selected device. At one glance, you can see the total traffic
generated by each application/category across each device. You can also drill down
the pie-chart to see specific application usage.
Drill down from each of the above graphs to see the following graphs:
Graph |
Description |
Top Hosts |
The top hosts generating traffic using this application |
Top Protocols |
The top protocols used in this application |
Top Users |
The top users generating traffic using this application |
Top Conversations |
The top conversations carried out by this application |
The Top Hosts graph shows
the top hosts contributing to application traffic to the firewall. The table below the graph shows the host name or IP address,
along with the number of hits and the total bytes of traffic generated.
The Top Protocols graph shows
the top protocols contributing to application traffic to the firewall. The table below the graph shows the protocol,
along with the number of hits and the total bytes of traffic generated.
The Top Users graph shows
the top users contributing to application traffic to the firewall. The table below the graph shows the users,
along with the number of hits and the total bytes of traffic generated.
The Top Conversations table lists details like host
which initiated the conversation, its destination, the protocol used for
the conversation, the application category along with the number of hits, the total bytes of traffic
generated and % of total traffic for the particular conversation.
The table,
shows the graph's data in more detail, with specific
percentage values of incoming and outgoing traffic per application/category
for the selected device. The Show bar lets you view the the
top 5(default) / 10 / 15 or All application groups, captured in the logs. You can click on the Traffic IN, Traffic
OUT,Total Traffic for each application of the configured device
to obtain the drill-downs of the traffic.
The table lists details like host
which initiated the conversation, its destination, the protocol used for
the conversation, the user along with the number of hits and the total bytes of traffic
generated for the particular application traffic.
Columns |
Description |
Applications |
The list of applications accessed using the selected Firewall |
Categories |
The list of application categories accessed using the selected Firewall |
Traffic In (MB) |
The % of total traffic and amount of inward traffic that was generated by the application/category |
Traffic Out (MB) |
The % of total traffic and amount of outward traffic that was generated by the application/category |
Total Traffic (MB) |
The % of total traffic and amount of total traffic that was generated by the application/category |
|